This is an intuitive status menu application written in Swift to help you spoof the MAC addresses of your Wi-Fi and Ethernet interfaces.
It is free as in open-source. Should you like to motivate me, you may click on the ✭ in the top-right corner.
The end-user documentation is located at halo.github.io/LinkLiar.
What you're looking at right now is the technical documentation.
There is also a source-code documentation in progress, see bin/docs for inspiration.
- macOS Sierra (see releases for older versions)
- Administrator privileges (you will be asked for your root password once)
If you have Homebrew, just run brew cask install linkliar.
Alternatively, grab the latest release of LinkLiar.app.zip, extract it,
and place it into your /Applications directory (see installation for help).
- When your Wi-Fi (aka Airport) is turned off, you cannot change its MAC address. You need to turn it on first.
- If you change a MAC address while the interface is connected, you will briefly loose connection.
You can create this logfile and whenever it exists, all LinkLiar components will write to it:
touch "/Library/Application Support/LinkLiar/linkliar.log"Delete the log file again to silence logging.
Once LinkLiar is started and the menu is visible, you can hold the ⌥ Option key for advanced options. This is only intended for developers.
- Add badge with test coverage to README
- Nicer GUI for specifying a MAC address manually (with option to randomize)
- The icon in
Link/Images.xcassetsis from Iconmonstr.
MIT 2017 halo. See MIT-LICENSE.
